MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 f25cf2ad4299df6cf65790e043f4aa0064cc00eb17ed02b910de29ce99ca31dd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RemcosRAT
Vendor detections: 5
| SHA256 hash: | f25cf2ad4299df6cf65790e043f4aa0064cc00eb17ed02b910de29ce99ca31dd |
|---|---|
| SHA3-384 hash: | 0203fb1ecc99607981425a5332e6b06c88c79ef472600bfcfa619bc9695c2cac24b56b0f035e1f6d7e4d6a0d9a6de401 |
| SHA1 hash: | 92468b452235e837f11682d61122134adc26d8ec |
| MD5 hash: | 74abdb77055ac434b1c9f486d497ff0c |
| humanhash: | network-social-alanine-music |
| File name: | Booking vouchers.rar |
| Download: | download sample |
| Signature | RemcosRAT |
| File size: | 526'053 bytes |
| First seen: | 2021-03-10 06:59:35 UTC |
| Last seen: | Never |
| File type: | rar |
| MIME type: | application/x-rar |
| ssdeep | 12288:AiKNEouuKrDyQOTJusZdo68NIsvzLvJAWsRq7ifqVOPXP+MY5ahcgia:AiJouuKr9kfSmsJAWsYuf6OP/6ahga |
| TLSH | CDB42360D93DC5507B389FBD400F64598D137BF91C90AD886DAEF91AB27E522023DB8E |
| Reporter | |
| Tags: | rar RAT RemcosRAT |
abuse_ch
Malspam distributing RemcosRAT:HELO: franceloc-postfix.filnet.fr
Sending IP: 194.187.193.118
From: Marmot Tours <info@wip-hausschutz.de>
Reply-To: hg.virtucycling@gmail.com
Subject: Group rooming list PT 1422
Attachment: Booking vouchers.rar (contains "Booking vouchers.exe")
RemcosRAT C2:
donjon555.hopto.org:2404 (185.19.85.134)
% Information related to '185.19.84.0 - 185.19.85.255'
% Abuse contact for '185.19.84.0 - 185.19.85.255' is 'abuse@datawire.ch'
inetnum: 185.19.84.0 - 185.19.85.255
netname: DATAWIRE-DATACENTERS
descr: CUSTOMERS ZG01
country: CH
admin-c: DA4314-RIPE
tech-c: DA4314-RIPE
status: ASSIGNED PA
mnt-by: DATAWIRE-NOC
created: 2013-09-23T14:18:55Z
last-modified: 2013-09-23T14:18:55Z
source: RIPE
Intelligence
File Origin
# of uploads :
1
# of downloads :
143
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Gathering data
Threat name:
ByteCode-MSIL.Trojan.Wacatac
Status:
Malicious
First seen:
2021-03-10 07:00:10 UTC
AV detection:
4 of 47 (8.51%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
RemcosRAT
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.